


default search action
EUROCRYPT 2005: Aarhus, Denmark
- Ronald Cramer:

Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings. Lecture Notes in Computer Science 3494, Springer 2005, ISBN 3-540-25910-4
Cryptanalysis I
- Xiaoyun Wang, Xuejia Lai, Dengguo Feng, Hui Chen, Xiuyuan Yu:

Cryptanalysis of the Hash Functions MD4 and RIPEMD. 1-18 - Xiaoyun Wang, Hongbo Yu:

How to Break MD5 and Other Hash Functions. 19-35 - Eli Biham, Rafi Chen, Antoine Joux, Patrick Carribault, Christophe Lemuet, William Jalby:

Collisions of SHA-0 and Reduced SHA-1. 36-57
Theory I
- Iftach Haitner, Omer Horvitz, Jonathan Katz, Chiu-Yuen Koo, Ruggero Morselli, Ronen Shaltiel:

Reducing Complexity Assumptions for Statistically-Hiding Commitment. 58-77 - Yael Tauman Kalai:

Smooth Projective Hashing and Two-Message Oblivious Transfer. 78-95 - Danny Harnik, Joe Kilian, Moni Naor, Omer Reingold, Alon Rosen:

On Robust Combiners for Oblivious Transfer and Other Primitives. 96-113
Encryption I
- Brent Waters:

Efficient Identity-Based Encryption Without Random Oracles. 114-127 - Masayuki Abe, Rosario Gennaro, Kaoru Kurosawa, Victor Shoup:

Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM. 128-146
Signatures and Authentication
- Xavier Boyen, Yevgeniy Dodis, Jonathan Katz, Rafail Ostrovsky, Adam D. Smith:

Secure Remote Authentication Using Biometric Data. 147-163 - Daniel J. Bernstein:

Stronger Security Bounds for Wegman-Carter-Shoup Authenticators. 164-180 - Kaoru Kurosawa, Swee-Huay Heng:

3-Move Undeniable Signature Scheme. 181-197 - Aggelos Kiayias, Moti Yung:

Group Signatures with Efficient Concurrent Join. 198-214
Algebra and Number Theory I
- Phong Q. Nguyen, Damien Stehlé:

Floating-Point LLL Revisited. 215-233 - Marten van Dijk

, Robert Granger
, Dan Page, Karl Rubin, Alice Silverberg, Martijn Stam, David P. Woodruff:
Practical Cryptography in High Dimensional Tori. 234-250 - Johannes Blömer, Alexander May

:
A Tool Kit for Finding Small Roots of Bivariate Polynomials over the Integers. 251-267
Quantum Cryptography
- Akinori Kawachi, Takeshi Koshiba, Harumichi Nishimura, Tomoyuki Yamakami:

Computational Indistinguishability Between Quantum States and Its Cryptographic Application. 268-284 - Claude Crépeau, Daniel Gottesman

, Adam D. Smith:
Approximate Quantum Error-Correcting Codes and Secret Sharing Schemes. 285-301
Secure Protocols
- Jan Camenisch, Susan Hohenberger, Anna Lysyanskaya:

Compact E-Cash. 302-321 - Martin Hirt, Jesper Buus Nielsen

, Bartosz Przydatek:
Cryptographic Asynchronous Multi-party Computation with Optimal Resilience (Extended Abstract). 322-340
Algebra and Number Theory II
- Pierre-Alain Fouque, Louis Granboulan, Jacques Stern:

Differential Cryptanalysis for Multivariate Schemes. 341-353 - Ludovic Perret:

A Fast Cryptanalysis of the Isomorphism of Polynomials with One Secret Problem. 354-370 - Matthias Ernst, Ellen Jochemsz, Alexander May

, Benne de Weger:
Partial Key Exposure Attacks on RSA up to Full Size Exponents. 371-386 - Daniele Micciancio

:
The RSA Group is Pseudo-Free. 387-403
Theory II
- Ran Canetti, Shai Halevi, Jonathan Katz, Yehuda Lindell, Philip D. MacKenzie:

Universally Composable Password-Based Key Exchange. 404-421 - Melissa Chase, Alexander Healy, Anna Lysyanskaya, Tal Malkin, Leonid Reyzin:

Mercurial Commitments with Applications to Zero-Knowledge Sets. 422-439
Encryption II
- Dan Boneh, Xavier Boyen, Eu-Jin Goh:

Hierarchical Identity Based Encryption with Constant Size Ciphertext. 440-456 - Amit Sahai, Brent Waters:

Fuzzy Identity-Based Encryption. 457-473
Cryptanalysis II
- John Kelsey

, Bruce Schneier:
Second Preimages on n-Bit Hash Functions for Much Less than 2n Work. 474-490 - Itsik Mantin:

Predicting and Distinguishing Attacks on RC4 Keystream Generator. 491-506 - Eli Biham, Orr Dunkelman, Nathan Keller:

Related-Key Boomerang and Rectangle Attacks. 507-525 - John Black, Martin Cochran, Thomas Shrimpton:

On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions. 526-541
Broadcast Encryption and Traitor Tracing
- Hervé Chabanne, Duong Hieu Phan

, David Pointcheval
:
Public Traceability in Traitor Tracing Schemes. 542-558 - Nam-Su Jho, Jung Yeon Hwang, Jung Hee Cheon, Myung-Hwan Kim, Dong Hoon Lee, Eun Sun Yoo:

One-Way Chain Based Broadcast Encryption Schemes. 559-574

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














